Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data fusion for location integrity in vehicle ad hoc networks., , and . iiWAS, page 805-808. ACM, (2010)A study of quadratic inference functions with alternative weighting matrices., and . Communications in Statistics - Simulation and Computation, 46 (2): 994-1007 (2017)Cross-layer Location Information Security in Vehicular Networks., , , and . J. Next Gener. Inf. Technol., 3 (2): 37-56 (2012)Unsupervised Learning Grouping-Based Resampling for Particle Filters., , , , and . IEEE Access, (2019)Active position security through dynamically tunable radar., , , and . MASS, page 733-738. IEEE Computer Society, (2010)Defects detection based on sparse regularization method for electromagnetic tomography (EMT)., , , , , , and . I2MTC, page 1-5. IEEE, (2017)Musicyolo: A Sight-Singing Onset/Offset Detection Framework Based on Object Detection Instead of Spectrum Frames., , , and . ICASSP, page 396-400. IEEE, (2022)Intelligent Recognition of Point Source Target Image Control Points with Simulation Datasets., , , and . ACPR (2), volume 13189 of Lecture Notes in Computer Science, page 387-401. Springer, (2021)Application of combined model with DGM(1, 1) and linear regression in grain yield prediction., , and . Grey Syst. Theory Appl., 8 (1): 25-34 (2018)Transition-Aware: A More Robust Approach for Piano Transcription., , , , and . DAFx, page 292-299. IEEE, (2021)